Only a key provided by you will fit the unique lock that Keyed Access creates on each end-user's computer, and software pirates are prevented from copying, reinstalling, backdating, restoring the registry, or modifying registry keys to get around registration screens.